Introduction to Penetration Testing

Georgia Tech Professional Education

How long?

  • 3 days
  • in person

Georgia Tech Professional Education

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.

Who should attend

This course is designed for information security personnel tasked with the defense of critical systems, networks, and infrastructure, as well as system administrators, advanced programmers, web developers, and database administrators.

About the course

As businesses become more dependent on interconnected systems for survival, they recognize a need to train their own personnel in assessment, exploitation, and remediation techniques. These “red teams” are becoming vital to organizations by exposing vulnerabilities early, implementing remediation procedures, and continually assessing the effectiveness of security strategies within an ever-changing threat landscape. This lab-based course will provide students with an understanding of the fundamental threat vectors and exploitation techniques used to penetrate systems and networks.

What You Will Learn

  • The penetration testing cycle from Recon to Impact Assessment
  • Social engineering attacks and impacts
  • Tools and techniques used for exploiting vulnerabilities
  • Network enumeration and vulnerability assessment
  • Exploitation fundamentals and post-exploitation implications
  • Web applications assessment
  • Basic fuzzing for vulnerabilities
  • How to create a culture of security throughout an organization

How You Will Benefit

  • Gain understanding of the threat vectors used to penetrate systems and networks.
  • Explore both classic and modern attacks and their impacts.
  • Gain a deep understanding of the penetration testing process.
  • Explore industry standard tools and techniques for exploiting vulnerabilities and assessing impact.
  • Work along with instructor in a custom, virtualized, lab-based environment supporting each topic.

Content

PENETRATION TESTING CYCLE

  • Research, Recon, Exploitation, Post Exploitation, Impact Assessment
  • Explore the synthesis of all aspects of the cycle

VULNERABILITY IDENTIFICATION AND EXPLOITATION

  • Network enumeration
  • Determine which vectors are most likely to achieve our goals
  • Identify appropriate tool set

MODERN ASSESSMENT

  • Discuss difference between “clean room” exploitation tutorials and real world pentesting exercises
  • Introduce client-side exploitation

POST-EXPLOITATION

  • Explore the universe of possibilities after successful compromise
  • Credential discovery and reuse
  • Lateral movement

FUZZING

  • History and road to modern techniques
  • Basic techniques for identifying software vulnerabilities

Experts

Trevor Lewis

Trevor Lewis is a Research Scientist, Professional Education instructor, and Penetration Tester for the Georgia Tech Research Institute. Trevor has nearly a decade of experience in information security including architecting security operations, computer network defense, penetration testing, and ...

Reviews

Make sure this course is right for you.

Get unbiased reviews and personalized recommendations.

Introduction to Penetration Testing at Georgia Tech Professional Education

From  $1,895

Something went wrong. We're trying to fix this error.

Thank you for your application

We will contact the provider to ensure that seats are available and, if there is an admissions process, that you satisfy any requirements or prerequisites.

We may ask you for additional information.

To finalize your enrollment we will be in touch shortly.

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.